DOC HOME SITE MAP MAN PAGES GNU INFO SEARCH PRINT BOOK
 

NAME

BTproc - Display a verbose stack trace of a process (1.4)

SYNOPSIS

BTproc address
Btproc address

DESCRIPTION

The BTproc command takes an argument, the address of a stack frame. It prints out a detailed stack trace, showing stack frame contents.

The BTproc command only traces as far back as the the entry into kernel space. Btproc will trace back into user space.

Typical output looks like this:


S> BTproc *curproc
setting process context to D1865000
   FF004A48     00000001
   FF004A4C     FF004A88                       u+A88
   FF004A50     C101EEBA                       xcmn_err+36A
   FF004A54     C11ECFD8
   FF004A58     00000000
   FF004A5C     00000010
   FF004A60     0000003C <
   FF004A64     08583B00
   FF004A68     FF004AA8                       u+AA8
   FF004A6C     C101CA36                       clock+316
   FF004A70     0003E538
   FF004A74     00989680
   FF004A78     C11C1074                       one_sec
   FF004A7C     00000008
   FF004A80     00000002
   FF004A84     00000000
   FF004A88     FF004A98                       u+A98
   FF004A8C     C101EB40                       cmn_err+10
      cmn_err+B:  E8 10 00 00 00                  call   10 
      cmn_err+10:  83 C4 08                       addl   $8,%esp
 xcmn_err(3,FF004AA4).................................esp:FF004A8C ret:C101EB40
   FF004A90     00000003      arg1
   FF004A94     FF004AA4      arg2             u+AA4
   FF004A98 000 FF004AAC      <-EBP(%ebp)      u+AAC
   FF004A9C 004 C10D94F5                       xi_panic+25
      xi_panic+20:  E8 3B 56 F4 FF                call   FFF4563B 
      xi_panic+25:  83 C4 0C                      addl   $C,%esp
 cmn_err(3,C11ECFD8,1)................................esp:FF004A9C ret:C10D94F5
   FF004AA0 008 00000003      8(%ebp)
   FF004AA4 00C C11ECFD8      C(%ebp)
   FF004AA8 010 00000001      10(%ebp)
   FF004AAC 000 FF004AD4      <-ESP(%ebp)      u+AD4
   FF004AB0 004 C10D93C8                       taggedint+68
      taggedint+62:  FF 97 D0 12 1D C1            call   *xifuncs(%edi)
      taggedint+68:  83 C4 14                     addl   $14,%esp
*xi_panic+25(1,FF004AF4,0,C144F038,0).................esp:FF004AB0 ret:C10D93C8
   FF004AB4 008 00000001      8(%esp)

 ( ... etc )
SYSTEM CALL read from 17:80010AFB(r0ptr:FF004E34, ss:esp: 1F:8047204)
   eax:00000003 ebx:8040C904 ecx:8FD23BBC edx:00000001 efl:00000282   ds:001F
   esi:8FD23B70 edi:8FD996F8 esp:FF004E80 ebp:08047224                es:001F
   FF004E30 008 FF004E34      8(%ebp)          u+E34
   FF004E34     00000000      GS
   FF004E38     00000000      FS
   FF004E3C     0000001F      ES
   FF004E40     0000001F      DS
   FF004E44     8FD996F8      EDI
   FF004E48     8FD23B70      ESI
   FF004E4C     08047224      EBP
   FF004E50     FF004E64      ESP              u+E64
   FF004E54     8040C904      EBX
   FF004E58     00000001      EDX
   FF004E5C     8FD23BBC      ECX
   FF004E60     00000003      EAX
   FF004E64     00000000      TRAPNO
   FF004E68     00000000      ERR
   FF004E6C     80010AFB      EIP
   FF004E70     00000017      CS
   FF004E74     00000282      EFL
   FF004E78     08047204      UESP
   FF004E7C     0000001F      SS

DEFINED IN

stack.k

SEE ALSO

Btproc, btproc, bt, sp

APPENDIX A: Alphabetic Index of Macros